Analysis and Design of Stealthy Cyber Attacks on Unmanned Aerial Systems

2014 ◽  
Vol 11 (8) ◽  
pp. 525-539 ◽  
Author(s):  
Cheolhyeon Kwon ◽  
Weiyi Liu ◽  
Inseok Hwang
Sensors ◽  
2020 ◽  
Vol 20 (12) ◽  
pp. 3537 ◽  
Author(s):  
Georgia Lykou ◽  
Dimitrios Moustakas ◽  
Dimitris Gritzalis

As the fastest growing segment of aviation, unmanned aerial systems (UAS) continue to increase in number, technical complexity and capabilities. Numerous civilian and commercial uses are drastically transforming civil protection, asset delivery, commercial and entertaining activities. However, UAS pose significant challenges in terms of safety, security and privacy within society. An increasing phenomenon, nowadays, is drone-related incidents near airport facilities, which are expected to proliferate in frequency, complexity and severity, as drones become larger and more powerful. Critical infrastructures need to be protected from such aerial attacks, through effective counteracting technologies, risk management and resilience plans. In this paper, we present a survey of drone incidents near airports and a literature review of sensor technologies, able to prevent, detect, identify and mitigate rogue drones. We exhibit the benefits and limitations of available counter-drone technologies (C-UAS); however, defending airports against misused drone activity is a hard problem. Therefore, we analyze three realistic attack scenarios from malicious drones and propose an effective C-UAS protection plan for each case. We discuss applicability limitations of C-UAS in the aviation context and propose a resilience action plan for airport stakeholders for defending against airborne threats from misused drones.


2019 ◽  
Vol 3 ◽  
pp. 1255
Author(s):  
Ahmad Salahuddin Mohd Harithuddin ◽  
Mohd Fazri Sedan ◽  
Syaril Azrad Md Ali ◽  
Shattri Mansor ◽  
Hamid Reza Jifroudi ◽  
...  

Unmanned aerial systems (UAS) has many advantages in the fields of SURVAILLANCE and disaster management compared to space-borne observation, manned missions and in situ methods. The reasons include cost effectiveness, operational safety, and mission efficiency. This has in turn underlined the importance of UAS technology and highlighted a growing need in a more robust and efficient unmanned aerial vehicles to serve specific needs in SURVAILLANCE and disaster management. This paper first gives an overview on the framework for SURVAILLANCE particularly in applications of border control and disaster management and lists several phases of SURVAILLANCE and service descriptions. Based on this overview and SURVAILLANCE phases descriptions, we show the areas and services in which UAS can have significant advantage over traditional methods.


Shore & Beach ◽  
2019 ◽  
pp. 44-49 ◽  
Author(s):  
Elizabeth Sciaudone ◽  
Liliana Velasquez-Montoya

Less than two weeks after Hurricane Florence made landfall in North Carolina (NC), a team of researchers from NC State University traveled to Dare County to investigate the storm’s effects on beaches and dunes. Using available post-storm imagery and prior knowledge of vulnerabilities in the system, the team identified several locations to visit in the towns of Kitty Hawk, Nags Head, Rodanthe, Buxton, and Hatteras, as well as a number of locations within the Pea Island National Wildlife Refuge (Figure 1). Data collected included topographic profiles, still imagery and video from unmanned aerial systems, sediment samples, and geo-located photography. This Coastal Observations piece presents some of the data and photos collected; the full report is available online (Sciaudone et al. 2019), and data collected will be made available to interested researchers upon request.


2019 ◽  
Author(s):  
Walter Ochieng ◽  
Tun Ye ◽  
Christina M. Scheel ◽  
Aun Lor ◽  
John M. Saindon ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document